CVE-2016-1242

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-1242
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-1242.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-1242
Aliases
Related
Published
2016-09-07T19:28:01Z
Modified
2024-11-21T14:59:25.486607Z
Severity
  • 4.4 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

file_open in Tryton before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allows remote authenticated users with certain permissions to read arbitrary files via the name parameter or unspecified other vectors.

References

Affected packages

Debian:11 / tryton-server

Package

Name
tryton-server
Purl
pkg:deb/debian/tryton-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / tryton-server

Package

Name
tryton-server
Purl
pkg:deb/debian/tryton-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / tryton-server

Package

Name
tryton-server
Purl
pkg:deb/debian/tryton-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}